I am often asked how threat actors get their malicious packages past both the latest technical monitoring and a well-trained staff. The quick answer is the hackers are always looking for and changing to new attack vectors – such as this one: MalDoc in PDFs: Hiding malicious Word docs in …
The wrong way to manage security patches…
…let the UK Government scrutinise your security patches before you are allowed to publish them to your vulnerable customers! Sounds like a bad dream. Read on. Security Patches are Important Alarm surrounds a clause in the UK’s Investigatory Powers Act. According to the proposed legislation, tech firms will be mandated …
Continue reading “The wrong way to manage security patches…”
Because It’s Friday – Star Wars
This Hubble image was first released by NASA for the release of “Star Wars Episode VII: The Force Awakens,” in December 2015. It is an Herbig-Haro (HH) object – this one is HH24 – and is located in the Orion B molecular cloud complex, located 1,350 light-years away from Earth. …
How to evade reputation based email cyber security
A very effective way to reduce phishing email is to enforce only receiving email from reputable email services. If you have not heard of this type of email protection then it is time to get in contact with us. However if the threat actors have a method of hijacking one …
Continue reading “How to evade reputation based email cyber security”
Time to think about more than just anti-virus
In a break from our series about cyber security risk, I wrote an article this week looking at why an organisation needs more than just anti-virus, if they want the best security they can afford… Anti-virus – This is why you need more and better… …starting at just £10 per …
Continue reading “Time to think about more than just anti-virus”